A comprehensive review of endpoint security: Threats and defenses

A Kamruzzaman, S Ismat, JC Brickley… - … on Cyber Warfare …, 2022 - ieeexplore.ieee.org
Endpoint Security/Protection is vital to an enterprise's cybersecurity platform. There are
many endpoints a malicious actor can attack to infiltrate and gain access to a system and …

Social engineering incidents and preventions

A Kamruzzaman, K Thakur, S Ismat… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
Social Engineering is a technique used to obtain information through tactics using
persuasion, intimidation, coercion, extortion, or blackmail. Social engineers study human …

Examining the institutional and legislative frameworks for enforcing cybersecurity in Zimbabwe

L Poshai, A Chilunjika, K Intauno - International Cybersecurity Law …, 2023 - Springer
The exponential growth in technology users around the world has subjected citizens and
their governments to a plethora of cyberspace threats. The adoption of Information …

[PDF][PDF] Enhancing phishing threat detection and resilience: Leveraging machine learning, ai, and user education in cybersecurity

F Dine - 2024 - researchgate.net
Phishing remains one of the most pervasive and evolving cyber threats, with increasingly
sophisticated tactics that target individuals and organizations alike. This paper explores the …

[PDF][PDF] Enhancing Cyber Security Resilience: Phishing Defense and the Importance of Measurement Strategies

F Sharif - 2024 - researchgate.net
In an era marked by increasing digital transformation, phishing attacks have emerged as a
pervasive threat, exploiting human vulnerabilities and technological weaknesses. These …

[PDF][PDF] Phishing Defense Mechanisms: Strategies for Effective Measurement and Cyber Threat Mitigation

J Hera - 2024 - researchgate.net
Phishing attacks continue to represent one of the most prevalent and damaging
cybersecurity threats facing organizations today. These deceptive tactics exploit human …

[PDF][PDF] AI-Enhanced Defense Metrics: Leveraging Bio-Inspired Algorithms for Advanced Threat Detection and Classification

A Khali - 2021 - researchgate.net
In the contemporary landscape of cybersecurity, the sophistication of threats has
necessitated the development of innovative defense strategies that leverage advanced …

[PDF][PDF] Evolving Phishing Defense: Innovative Defense Mechanisms and Effective Measurement Strategies

A Abbas - 2024 - researchgate.net
Phishing attacks remain one of the most prevalent threats in the cybersecurity landscape,
targeting individuals and organizations to gain unauthorized access to sensitive information …

[PDF][PDF] Maximizing Security with the Policy of Least Privilege and Segregation of Duties in Organizations

A Abbas - 2024 - researchgate.net
In today's digital landscape, securing sensitive data and minimizing risks are crucial for
organizations of all sizes. Two critical principles that play a vital role in achieving robust …

[PDF][PDF] Machine Learning Innovations in Intrusion Detection Systems (IDS): Emphasizing Ensemble Learning for Enhanced Security

S Afridi - 2024 - researchgate.net
As cyber threats continue to escalate in complexity and frequency, traditional Intrusion
Detection Systems (IDS) often struggle to keep pace with the dynamic landscape of security …